Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%3 400 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (64)
  • Article (21)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 Next »

25%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
are generating a test installation only. While the installation process is running, the Ubuntu host needs additional resources. Even though only 3GB of RAM and two processor cores are required, the installation
25%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
(remote syslog) [3], an open source tool for forwarding log messages to a central server using an IP network. It is very configurable using the /etc/rsyslog.conf file and the files in the /etc
25%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
web interface, a REST API, and support for a wider array of databases. Because Icinga was forked from Nagios code, it maintains compatibility with Nagios plugins [3]. Some of Icinga's key features are
25%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
fingerprint is 87:17:c3:92:44:ba:1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue connecting (yes/no)? This prompt wants to establish a permanent secure key between the two hosts for future
25%
Win-win with Cygwin
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Steve Mann, 123RF.com
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:c3:92:44:ba: 1a:df:d7:9c:44:b2:5b:73:52:09. Are you sure you want to continue
25%
Fast system management from Puppet Labs
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Artmann Witte, fotolia.com
45 46 47 48 49 50 51 52
25%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
in your kernel configuration and possibly rebuild the kernel. Including the symbols, vmlinux weighs in at more than 40MB. Next, open a connection to the debug server by typing target remote :1234 (Figure 3
25%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
is to look at the most efficient method of managing FOSS on AIX with the DNF package manager. AIX Toolbox Today more than 400 open source packages are available for download at the IBM hosted repository
25%
Network analysis with the Bro Network Security Monitor
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
DHCP exist: one from 4:00am and one from 3:00pm. With the bro-cut command, I can determine that the earliest assignment by the rogue server was at 4:04am and assigned the address 192.168.1.27 (Listing 7
25%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
(One-by-One) 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my_record; 14 int counter_limit; 15

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice